Cyber Posture

CVE-2025-14134

HighPublic PoC

Published: 06 December 2025

Published
06 December 2025
Modified
10 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0037 59.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14134 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Linksys Re6500 Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates the clientsname_0 argument to prevent stack-based buffer overflows from malformed or oversized inputs in the mod_form.so function.

prevent

Implements memory safeguards like stack canaries, ASLR, and non-executable memory to block exploitation of the stack-based buffer overflow.

preventrecover

Requires timely identification, reporting, and correction of the buffer overflow flaw in affected Linksys firmware versions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack-based buffer overflow in the remote web interface function RE2000v2Repeater_get_wireless_clientlist_setClientsName (mod_form.so) enables remote code execution via exploitation of a public-facing application.

NVD Description

A vulnerability was determined in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected by this issue is the function RE2000v2Repeater_get_wireless_clientlist_setClientsName of the file mod_form.so. Executing manipulation of the argument clientsname_0 can lead to stack-based buffer overflow. The attack…

more

can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-14134 is a stack-based buffer overflow vulnerability in the RE2000v2Repeater_get_wireless_clientlist_setClientsName function of the mod_form.so file. It affects Linksys Wi-Fi range extenders, specifically models RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000 running firmware versions 1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001.

The vulnerability is exploitable remotely over the network by an attacker with low privileges, requiring low attack complexity and no user interaction. Manipulation of the clientsname_0 argument triggers the buffer overflow, enabling high-impact consequences including unauthorized access to confidential data, modification of system integrity, and denial of service, as scored at CVSS 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Advisories from VulDB and referenced GitHub repositories disclose a publicly available proof-of-concept exploit but note no response from the vendor despite early notification, with no patches or mitigations provided. Security practitioners should isolate affected devices and monitor for exploitation attempts detailed in the references.

The exploit has been publicly disclosed and may be utilized, with root causes tied to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-121 (Stack-based Buffer Overflow).

Details

CWE(s)

Affected Products

linksys
re6500 firmware
1.0.013.001
linksys
re6250 firmware
1.0.04.001
linksys
re6300 firmware
1.2.07.001
linksys
re6350 firmware
1.0.04.001
linksys
re7000 firmware
1.1.05.003
linksys
re9000 firmware
1.0.04.002

CVEs Like This One

CVE-2025-8824Same product: Linksys Re6250
CVE-2025-9245Same product: Linksys Re6250
CVE-2025-9246Same product: Linksys Re6250
CVE-2025-9250Same product: Linksys Re6250
CVE-2025-9482Same product: Linksys Re6250
CVE-2025-9356Same product: Linksys Re6250
CVE-2025-9249Same product: Linksys Re6250
CVE-2025-9363Same product: Linksys Re6250
CVE-2025-9392Same product: Linksys Re6250
CVE-2025-9252Same product: Linksys Re6250

References